Bangalore Sunday Logo
 
Home | Contact us
News & Events
Home Subscribe project 100% job technology
Project List
Dot Net IEEE 2017-18
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1
Continuous Top-k Monitoring on Document Streams


BIGDATA-MONGODB
NOSQL-MONGODB ON BIG DATA
2
Self-Healing in Mobile Networks with Big Data
3
Secure Big Data Storage and Sharing Scheme for Cloud Tenants
4
Processing Incomplete k Nearest Neighbor Search
5
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
6
K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
7
GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
8
Given the variety of resources available in public clouds and locally (hybrid clouds), it can be very difficult to determine the best number and type of resources to allocate (and where) for a given activity. In order to solve this problem we first d
9
FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
10
Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
11
Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
12
Efficient Processing of Skyline Queries Using MapReduce
13
Dynamic Resource Allocation for MapReduce with Partitioning Skew
14
Differentially Private Frequent Itemset Mining via Transaction Splitting
15
Deduplication on Encrypted Big Data in Cloud
16
Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
17
Big Data, Big Knowledge: Big Data for Personalized Healthcare
18
A Crowdsourcing Worker Quality Evaluation Algorithm Crowdsourcing Worker Quality Evaluation Algorithm Crowdsourcing Worker Quality Evaluation Algorithm Crowdsourcing Worker Quality Evaluation Algorithm Crowdsourcing Worker Quality Evaluation Algorith
19
A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn


JAVA IEEE 2016-17
IEEE INTELLIGENT SYSTEMS
IEEE TRANSACTION ON COMPUTERS
20
Understanding Deep Representations Learned in Modeling Users ‘Likes’
21
Two-Factor Data Security Protection Mechanism for Cloud Storage System
22
ID2S Password-Authenticated Key Exchange Protocols
23
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
24
Uncertainty Analysis for the Keyword System of Web Events
25
TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
26
Server-Aided Public Key Encryption with Keyword Search
27
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage
28
Immutable Authentication and Integrity Schemes for Outsourced Databases
29
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
30
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
31
Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
32
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
33
A Shoulder Surfing Resistant Graphical Authentication System
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING
34
Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
35
Ensembling Classifiers for Detecting User’s Intentions behind Web Queries
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
36
Sentiment Embeddings with Applications to Sentiment Analysis
37
Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
38
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
39
Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
40
Online Subgraph Skyline Analysis Over Knowledge Graphs
41
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
42
Mining High Utility Patterns in One Phasewithout Generating Candidates
43
Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
44
Efficiently Estimating Statistics of Points of Interests on Maps
45
Crawling Hidden Objects with kNN Queries
46
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
47
Aspect-level Influence Discovery from Graphs
48
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE TRANSACTIONS ON MULTIMEDIA
49
Multi-Modal Event Topic Model for Social Event Analysis
50
Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
51
A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE TRANSACTIONS ON SERVICES COMPUTING
52
Where you are is who you are: User identification by matching statistics
53
Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
54
Topic-Oriented Exploratory Search Based on an Indexing Network
55
Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
56
Tag Based Image Search by Social Re-ranking
57
Social Friend Recommendation Based on Multiple Network Correlation
58
SecRBAC: Secure data in the Clouds
59
Online Learning in Large-scale Contextual Recommender Systems
60
Nearest Keyword Set Search in Multi-dimensional Datasets
61
NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
62
Mitigating Cross-Site Scripting Attacks with a Content Security Policy
63
From Latency, through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources
64
Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
65
Encrypted Data Management with Deduplication in Cloud Computing
66
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
67
An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
68
A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee.
IEEE/ACM TRANSACTIONS ON NETWORKING
69
Electronic Commerce Meets the Semantic Web


ANDROID IEEE 2016 -17
IEEE IEEE TRANSACTIONS ON COMPUTERS
IEEE TRANSACTIONS ON CLOUD COMPUTING
70
The impact of cloud technology on the automation of businesses
71
Read2Me: A Cloud- based Reading Aid for the Visually Impaired
72
PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
73
Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
74
Designing a Secure Exam Management System (SEMS) for M-Learning Environments
75
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
76
A Modified Hierarchical Attribute-Based Encryption Access Control
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
77
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks
78
Optimizing User Experience in Choosing Android Applications
79
Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal
IEEE TRANSACTIONS ON MOBILE COMPUTING
80
Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
81
The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
82
ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
83
Service Rating Prediction by Exploring Social Mobile Users’ Geographical Locations
84
SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities
85
Scheduling Crowdsensing Data to Smart City Applications in the Cloud
86
SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
87
Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
88
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
89
Intelligent Hands Free Speech based SMS System on Android
90
EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
91
Design of Secure Location and Message Sharing System for Android Platform
92
Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
93
Authentication of Smartphone Users Using Behavioral Biometrics
IEEE TRANSACTIONS ON SECURITY COMPUTING
94
Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
95
Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
IEEE/ACM TRANSACTIONS ON NETWORKING
SERVICE COMPUTING
96
Privacy-Preserving Location Sharing Services for Social Networks
97
MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
98
FoodForCare: An Android Application for Self-Care with Healthy Food
99
Developing Apps for Visually Impaired People: Lessons Learned from Practice


Dot Net IEEE 2016-17
IEEE TRANSACTIONS ON CLOUD COMPUTING
100
Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
101
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
102
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
103
Cloud workflow scheduling with deadlines and time slot availability
104
Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
105
A Forecasting Methodology for Workload Forecasting in Cloud Systems
IEEE TRANSACTIONS ON COMPUTERS
106
Privacy-Preserving Selective Aggregation of Online User Behavior Data
107
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
108
Democratic Diffusion Aggregation for Image Retrieval
109
Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
110
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
111
TagBook: A Semantic Video Representation without Supervision for Event Detection
112
Statistical Features Based Real-time Detection of Drifted Twitter Spam
113
Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
114
Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
115
Providing User Security Guarantees in Public Infrastructure Clouds
116
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
117
Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
118
Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
119
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
120
Text Mining the Contributors to Rail Accidents
121
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
122
PiCode: a New Picture-Embedding 2D Barcode
123
Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
124
Incremental Consolidation of Data-Intensive Multi-flows
125
Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
126
Explaining Missing Answers to Top-k SQL Queries
127
Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems
128
A Recommendation System to Facilitate Business Process Modeling
IEEE TRANSACTIONS ON MOBILE COMPUTING
129
What Is Happening in The Video? –Annotate Video by Sentence
130
Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON SECURITY COMPUTING
131
User Preference Learning for Online Social Recommendation
132
Two level QR code for private message sharing and document authentication
133
Steganalysis Features for Content-Adaptive JPEG Steganography
134
Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
135
Privacy-Preserving Outsourced Media Search
136
Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
137
Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
138
Interactive Streaming of Sequences of High Resolution JPEG2000 Images
139
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
140
Friendbook: A Semantic-based Friend Recommendation System for Social Networks
141
Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
142
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
143
Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
144
Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
145
An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
146
A Credibility Analysis System for Assessing Information on Twitter
147
A Credibility Analysis System for Assessing Information on Twitter
IEEE/ACM TRANSACTIONS ON NETWORKING
148
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
SERVICE COMPUTING
149
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
150
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
151
Optimal Shipping Strategy and Return Service Charge Under No-Reason Return Policy in Online Retailing
152
Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
153
Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
154
Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


Dot Net IEEE 2014-15
International Conference on Pervasive Computing
155
Cotton Leaf Disease Identification using Pattern Recognition Techniques


JAVA IEEE 2017-18
Transactions on Dependable and Secure Computing
156
Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


NEW ANDROID APPS
NEW APPS
157
TIME TABLE GENERATOR
158
PERSONAL ASSISTANCE (PA)
159
PERSONAL ASSISTANCE (PA)
160
Parking Management
161
Online Provisional Store
162
ONLINE DOCTOR APPOINTMENT
163
ONLINE ATTENDANCE TRACKING
164
LOVE AND CARE
165
Hungry (Food waste management)
166
House Rent Management System
167
HEALTH CARE
168
FORMER SHARING INFORMATION
169
FACULTY RATING SYSTEM
170
CONSTRUCTION MANAGEMENT
171
CONSTRUCTION MANAGEMENT
172
College Management System
173
CHILD CARE
174
ATHLETE MEET GUIDE
175
ATHLETE MEET GUIDE
176
APP FOR SELF ORGANIZER
177
Android Assist for Lecturer and Student
178
ANDROID 2016


IEEE 2012 Projects
IEEE DotNet
179
IEEE 2012 Dot Net Projects


Php projects
PHP Application
180
School Management System
PHP IEEE
181
Web Image Search Re-ranking with Click-based Similarity and Typicality
182
Understanding and Predicting Question Subjectivity in Social Question and Answering
183
Understanding and Predicting Question Subjectivity in Social Question and Answering
184
Semantic Retrieval of Trademarks Based on Conceptual Similarity
185
Semantic Retrieval of Trademarks Based on Conceptual Similarity
186
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
187
School Management System
188
Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
189
PHP IEEE 2013 Projects
190
Filtering out Infrequent Behavior from Business Process Event Logs
191
Automatically Mining Facets for Queries from Their Search Results


Dotnet Application
Dotnet Apps
192
Zero-Knowledge Proof System On Outsourcing Cloud Data Integrity
193
Web Based Customer Favorite vehicle Search Engine
194
Virtual Energy- Based Encryption and Keying
195
Virtual Energy- Based Encryption and Keying
196
Video Fraud Detecting On Social Network
197
Video Fraud Detecting On Social Network
198
Vendor Information System For Shiping
199
VALUE ADDED TAX (VAT)
200
Ultimate Location Information Systems
201
Top-K ranking System
202
The video stream in an AVI file is nothing more than a sequence of bitmaps. This article is about extracting these bitmaps and re-building the stream, in order to hide a message in the video. Before reading this article, you should have read at least
203
The advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to
204
Techno Task Manager
205
Steganography for Data Reading and Writing Video files
206
Steganography for Data Reading and Writing Video files
207
Steganography for Data Reading and Writing AVI files
208
SPONSORSHIP FOR AGRICULTURE
209
SMART CAB BOOKING SYSTEM
210
session authentication passwords using color
211
Sentence based search on cloud
212
Secured Image communicator
213
Secure Service-Oriented Smartcard systems
214
Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
215
Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
216
Secure Location Identification System
217
Secure and Cloud Based Patient Information Systems
218
Recommendation System Based on Graph
219
RAILWAY SEAT RESERVATION SYSTEM
220
Quality Controller
221
Public Web Status Monitoring System
222
Project Trade Pool
223
Personal Health Information On M-Healthcare Emergency
224
OPTIMUM ONLINE KNOWLEDGE BASE
225
Optimal disease - treatment analysis for cloud cache
226
Online Training Program
227
Online Tag Based Image Retrieval And Effective Management
228
Online product Opinion and Ranking System
229
ONLINE FAST FOOD ORDER
230
Online digital contract signing in mistrusted parities
231
Multi-user public auditing system of data storage security
232
Modern distributed business applications for supply-chain management
233
Market Intelligence based public sentiment analysis
234
LIVE WEB DOCTOR CONSULTATION.
235
LEAVE MANAGEMENT SYSTEM
236
jhmcghmhmfhjmfjmc
237
INVENTORY SYSTEM FOR ELECTRONICS FACTORY
238
Information Leak Detection and Prevention
239
Industrial Manpower Resource Organizer
240
In Cloud Can Scientific Communities Benefit From The Economies Of Scale
241
Human Expertise Search Engine
242
High Secure Corporate Web Search Engine
243
High Degree Patient Privacy On Secure Data Outsourcing
244
Group Movement Pattern Discovery
245
Graph Based Share Market Data Updating
246
Generic Business Portal
247
Generic Business Portal
248
Flight Booking Portal
249
Firewall
250
Finger Print Identification Techniques From Abrading, Cutting, And Burning Fingers
251
Employee Based Performance Monitoring and Action Systems
252
Emerging Patient Health Information Exchange System On Cloud
253
Distributed Database Optimization on HelthCare
254
Digital Asset Management Systems (DAMS) Using Watermarking
255
Digital Asset Management Systems (DAMS) Using Watermarking
256
Detecting Fraud on Vehicle Insurance System
257
Defeating Lazy Servers Database Vs Query Access Assurance
258
Data Mining Analysis on EB bill system
259
Data Mining Analysis on EB bill system
260
Data confidential against untrusted servers using attribute-based encryption (ABE)
261
Customer Sales Analysis System Based On Purchasing
262
Cotton Leaf Disease Identification using Pattern Recognition Techniques
263
COMPLETE MEDICAL TRANSCRIPTION SYSTEM(MTS)
264
College Result Analysis
265
Cloud Economic Benefit On Scientific Computing
266
Cloud Documents Security Using Interactive Zero Knowledge Proof Prevent
267
Cable Operator Management System
268
Business Activity Coordination Using Web Services
269
Budget Planner
270
Archive Secure Medical Image System
271
Archive Secure Medical Image System
272
Application layer blocker for preventing on cyber security
273
Advanced One Click User Web Search Engine
274
A Reservation Based Coordination Protocol For Web Services
275
Quantum Key Cryptography


Java Struts Projects
Struts Code
276
Public Sentiment Analysis with Online Shopping
277
High Confidential Personal Disease Reporting System
278
Distributor Sensitive Data Management Using Struts
279
Distributor Sensitive Data Management Using Struts
280
Distributor Sensitive Data Management Using Struts
281
Distributor Sensitive Data Management Using Struts


JAVA Application
APPS JAVA
282
Young Talent Tracker
283
Web Server Security with Web Client Management System
284
Web Server Security With Web Client Management System
285
Web Parser On Sequence Alignment Techniques
286
Web Parser On Sequence Alignment Techniques
287
Web Hosting On Cloud
288
Web Hosting On Cloud
289
VIP Information Gathering On WEB With Name Aliases
290
VIP Information Gathering On WEB With Name Aliases
291
Unique Web Resources Utilization Monitoring System
292
Unique Web Resources Utilization Monitoring System
293
Trained Volunteers Create A Successful Social Campaign
294
Sql Tuner
295
SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
296
SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
297
Sequential Anomaly Detection From User Behaviour
298
Sequential Anomaly Detection From User Behaviour
299
Secure Online Documents Management System In Cloud
300
Secure Online Documents Management System In Cloud
301
Recommendation System Based On Web Usage Mining And Semantic Web A Survey
302
Query Response System For File Management
303
Quality Visualization On Web TV
304
Quality Visualization On Web TV
305
Product Market Manipulations On Asian Stock Market
306
Product Market Manipulations On Asian Stock Market
307
Personalize Your News on Web
308
Personalize Your News On Web
309
Organizing medical camp for public health development
310
Online Search Ranking On Multiple Domain
311
Online Search Ranking On Multiple Domain
312
Online Multi Type Documents Search Engine
313
Online Multi Type Documents Search Engine
314
ONLINE MOBILE BILLING SYSTEM
315
ONLINE MOBILE BILLING SYSTEM
316
Online Banking With Fraud Detecting
317
Nearest Shopping Location Identification Systems
318
Movie Recommender Systems via User- Item Subgroups
319
Movie Recommender Systems via User Item Subgroups
320
Movie Rating And Recommendation On Mobile
321
Movie Rating And Recommendation On Mobile
322
Monitoring Suspicious Discussions on Online Forums Using Data Mining
323
Modern Municipal Corporation
324
Mobile TV Quality Management
325
Mobile TV Quality Management
326
Mobile TV Quality Management
327
Management System In Train
328
Land Bank for Nursery
329
Key Management For Content Integration
330
Java Real Time Application
331
Information And Knowledge Extracting From A Large Amount Of Data
332
Information And Knowledge Extracting From A large Amount Of Data
333
Industry Standard Authorization For Sensitive Resources
334
Industry Standard Authorization For Sensitive Resources
335
Hope-Center
336
Finger Print E-Voting Systems
337
FILE SEARCH ENGINE
338
FILE SEARCH ENGINE
339
Fast Web Information Gathering with Alias Detection
340
Fast Web Information Gathering With Alias Detection
341
Encrypted Data Storage Vs Data Against illegal Access
342
Encrypted Data Storage vs Data Against Illegal Access
343
Enabling Site Interaction In Social Community
344
Enabling Site Interaction In Social Community
345
E-Music World
346
E-Fraud Prevention Based On The Self Authentication Of E-Documents
347
Digital Documents Attestation Systems
348
Digital Documents Attestation Systems
349
Developing Rural Economy
350
Defending Against Web Application Vulnerabilities
351
Defending Against Web Application Vulnerabilities
352
Data Theft Detection Mobile Cloud Computing
353
Data Theft Detection Mobile Cloud Computing
354
Customer Information Hiding For Data Mismanagement In Banking
355
Customer Information Hiding For Data Mismanagement In Banking
356
CORPORATE REQUIREMENT SYSTEM
357
CORPORATE REQUIREMENT SYSTEM
358
Consumer Sales Online Fake Product Detection And Deletion
359
Consumer Sales Online Fake Product Detection And Deletion
360
Cloud Policy-Based File Assure Deletion
361
Cloud Policy Based File Assure Deletion
362
Cloud Cyber Attacks Against Social Networks
363
Cloud Cyber Attacks Against Social Networks
364
Cloud Cost Management for Customer Sensitive Data
365
Cloud Cost Management For Customer Sensitive Data
366
Citizen Card System
367
Citizen Card System
368
Attribute Key Based Data Security System
369
Attribute Key Based Data Security System
370
Annotation of short texts With Wikipedia pages
371
Annotation Of Short Texts With Wikipedia Pages
372
Advance User Management On Social Website
373
Advance User Management On Social Website
374
A Game Theory for Online Security
375
A Game Theory For Online Security
376
I-school


 
IEEE 2014-2015 Java Projects